Static task
static1
Behavioral task
behavioral1
Sample
L4D2 Bhop/l4d2-autobhop-starter.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
L4D2 Bhop/l4d2-autobhop-starter.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
L4D2 Bhop/l4d2-autobhop.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
L4D2 Bhop/l4d2-autobhop.exe
Resource
win10v2004-20231215-en
General
-
Target
L4D2 Bhop.rar
-
Size
5KB
-
MD5
1271b2b5db515e8f4052db8e462b5166
-
SHA1
aeb968e0513263a989f89119b0569a6d4a316873
-
SHA256
95cb0a95c2480eee6846d1c5e11bf996e7a5360a0bd0671ceb38f5c3e6f6610c
-
SHA512
f7d38caea7c91b402bcb85d47fbb603622910562b2ddd0b3ad65452fbefef5ba7565ce5af9daf4cb7ae2ddfb950cf3666b1796e68be067a646ec4dc8c8604f0d
-
SSDEEP
96:Hac8XkJvqNmwdKwKmdwosx4oufm4etgoQDw0wW/jc6RDbEZ5V7/aH5ODIeJPSkCg:Hac80dqgosxUfpoQDwEYtVi5O9JaQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/L4D2 Bhop/l4d2-autobhop.exe
Files
-
L4D2 Bhop.rar.rar
Password: infected
-
L4D2 Bhop/l4d2-autobhop-starter.bat
-
L4D2 Bhop/l4d2-autobhop.exe.exe windows:6 windows x64 arch:x64
Password: infected
6781fdb39de7b4765f1079cf4296444c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
Sleep
CloseHandle
ReadProcessMemory
Module32FirstW
Module32NextW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleW
user32
SendMessageW
GetAsyncKeyState
GetWindowThreadProcessId
FindWindowW
vcruntime140
__current_exception
__current_exception_context
memset
__C_specific_handler
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
puts
fputs
__p__commode
__stdio_common_vsscanf
_set_fmode
__acrt_iob_func
api-ms-win-crt-runtime-l1-1-0
_c_exit
_initterm
_initialize_onexit_table
_cexit
_crt_atexit
terminate
_get_initial_narrow_environment
_initialize_narrow_environment
_register_thread_local_exe_atexit_callback
__p___argv
_initterm_e
_configure_narrow_argv
_register_onexit_function
_set_app_type
_exit
_seh_filter_exe
exit
__p___argc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ